Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute one of the most severe threats to software programs. These attacks are prevalent and have been recently applied to smartphone applications as well, of which hundreds of thousands are downloaded by users every day. While a framework for control-flow integrity (CFI) enforcement, an approach to prohibit this kind of attacks, exists for the Intel x86 platform, there is no such a solution for smartphones. In this paper, we present a novel framework, MoCFI (Mobile CFI), that provides a general countermeasure against control-flow attacks on smartphone platforms by enforcing CFI. We show that CFI on typical smartphone platforms powered by an ARM p...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
Despite extensive research over the last two decades, runtime attacks on software are still prevalen...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Apple iOS is one of the most popular mobile operating sys-tems. As its core security technology, iOS...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Memory corruption is one of the oldest and most prominent problems in the field of computer security...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Mobile operating systems provide a layer with which users exclusively interact. Despite the simplici...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...
Despite extensive research over the last two decades, runtime attacks on software are still prevalen...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Apple iOS is one of the most popular mobile operating sys-tems. As its core security technology, iOS...
Nowadays, the growing pervasiveness of digital components and their interconnection in the so-called...
The costs and damages that result from cyber security weaknesses are increasing year by year. The cy...
Code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (...
Apple iOS is one of the most popular mobile operating systems. As its core security technology, iOS ...
Exploitation of memory corruption vulnerabilities in widely used software has been a threat for almo...
Memory corruption is one of the oldest and most prominent problems in the field of computer security...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
Mobile operating systems provide a layer with which users exclusively interact. Despite the simplici...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
The usage and ownership of mobile devices is increasing globally. Our reliance on mobile devices and...
The increasing number of repeated malware penetrations into official mobile app markets poses a high...